You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Enhance documentation for OADP CloudStorage API, including installation instructions via OpenShift web console and provider-specific configurations for AWS, Azure, and GCP.
== Installing OADP Operator via OpenShift Web Console
210
+
211
+
When installing the OADP operator through the OpenShift web console with tokenized authentication support, you will be presented with cloud provider-specific configuration fields.
212
+
213
+
[NOTE]
214
+
====
215
+
For OpenShift 4.15 and later, the web console supports tokenized authentication during operator installation, allowing you to provide cloud credentials directly through the installation form.
216
+
====
217
+
218
+
.Console Installation Fields for AWS
219
+
220
+
During operator installation, the web console will display the following field:
221
+
222
+
*role ARN*::
223
+
**Field Label:** "role ARN"
224
+
+
225
+
**Help Text:** "The role ARN required for the operator to access the cloud API."
226
+
+
227
+
**Value to Enter:** Use the `ROLE_ARN` value from the prerequisite setup steps above (e.g., `arn:aws:iam::123456789012:role/openshift-adp-controller-manager`).
228
+
229
+
This field corresponds to the IAM role you created in the prerequisite steps. The role ARN format is `arn:aws:iam::${AWS_ACCOUNT_ID}:role/${ROLE_NAME}`.
230
+
208
231
[id="oadp-aws-cloud-storage-api_{context}"]
209
232
== Alternative: Using Cloud Storage API for Automated Bucket Management
210
233
211
-
Instead of manually creating S3 buckets, you can use the OADP Cloud Storage API to automatically manage bucket creation and configuration. This approach requires OADP operator version with Cloud Storage API support.
234
+
Instead of manually creating S3 buckets, you can use the OADP CloudStorage API to automatically manage bucket creation and configuration.
212
235
213
-
.Prerequisites for Cloud Storage API
236
+
[NOTE]
237
+
====
238
+
For comprehensive documentation on the CloudStorage API, including detailed configuration options, troubleshooting, and advanced usage, see link:../oadp-cloudstorage-api.html[OADP CloudStorage API].
239
+
====
214
240
215
-
* OADP operator with Cloud Storage API functionality enabled
216
-
* The same AWS STS configuration as above
241
+
.AWS-Specific CloudStorage Configuration
217
242
218
-
.Procedure for Cloud Storage API
243
+
For AWS with STS authentication, create a CloudStorage resource using the variables from the STS setup above:
219
244
220
-
. Create a CloudStorage resource instead of manually creating buckets:
221
-
+
222
245
[source,yaml]
223
246
----
224
247
cat <<EOF | oc apply -f -
@@ -234,12 +257,11 @@ spec:
234
257
creationSecret:
235
258
name: cloud-credentials-aws
236
259
key: credentials # Required key name for AWS provider
237
-
creationPolicy: CreateIfNotExists
238
260
EOF
239
261
----
240
262
241
-
. Create the DataProtectionApplication with Cloud Storage API reference:
242
-
+
263
+
Then configure your DataProtectionApplication to use the CloudStorage resource:
264
+
243
265
[source,yaml]
244
266
----
245
267
cat <<EOF | oc apply -f -
@@ -258,7 +280,6 @@ spec:
258
280
backupLocations:
259
281
- name: default
260
282
bucket:
261
-
# Reference the CloudStorage resource instead of direct bucket
262
283
cloudStorageRef:
263
284
name: aws-backup-storage
264
285
prefix: velero
@@ -280,16 +301,10 @@ spec:
280
301
EOF
281
302
----
282
303
283
-
. Verify the CloudStorage resource status:
284
-
+
285
-
[source,bash]
286
-
----
287
-
oc get cloudstorage aws-backup-storage -n openshift-adp -o yaml
CloudStorage resources are protected by a finalizer (`oadp.openshift.io/bucket-protection`) to prevent accidental deletion of buckets containing backup data. To delete a CloudStorage resource, you must first add the deletion annotation:
316
-
317
-
[source,bash]
318
-
----
319
-
# Add deletion annotation before attempting to delete
Without this annotation, the deletion will hang indefinitely as the finalizer prevents removal.
328
-
329
-
Alternatively, if you want to remove the CloudStorage resource from OpenShift without deleting the S3 bucket in AWS, you can manually remove the finalizer:
330
-
331
-
[source,bash]
332
-
----
333
-
# Remove finalizer to delete CloudStorage CR without deleting the S3 bucket
== Alternative: Using Cloud Storage API for Automated Bucket Management
262
262
263
-
The OADP Cloud Storage API can automatically manage S3 bucket creation and configuration for ROSA STS clusters.
263
+
The OADP CloudStorage API can automatically manage S3 bucket creation and configuration for ROSA STS clusters.
264
264
265
-
.Prerequisites for Cloud Storage API
265
+
[NOTE]
266
+
====
267
+
For comprehensive documentation on the CloudStorage API, including detailed configuration options, troubleshooting, and advanced usage, see link:../oadp-cloudstorage-api.html[OADP CloudStorage API].
268
+
====
266
269
267
-
* OADP operator with Cloud Storage API functionality enabled
268
-
* The same ROSA STS configuration as above
270
+
.ROSA-Specific CloudStorage Configuration
269
271
270
-
.Procedure for Cloud Storage API
272
+
For ROSA, create a CloudStorage resource with the following configuration:
271
273
272
-
. Create a CloudStorage resource for ROSA:
273
-
+
274
274
[source,yaml]
275
275
----
276
276
cat <<EOF | oc apply -f -
@@ -286,12 +286,11 @@ spec:
286
286
creationSecret:
287
287
name: cloud-credentials-aws
288
288
key: credentials
289
-
creationPolicy: CreateIfNotExists
290
289
EOF
291
290
----
292
291
293
-
. Create the DataProtectionApplication with Cloud Storage API reference:
294
-
+
292
+
Then configure your DataProtectionApplication with ROSA-specific settings:
293
+
295
294
[source,yaml]
296
295
----
297
296
cat <<EOF | oc apply -f -
@@ -332,21 +331,12 @@ spec:
332
331
EOF
333
332
----
334
333
335
-
. Verify the CloudStorage resource status:
336
-
+
337
-
[source,bash]
338
-
----
339
-
oc get cloudstorage rosa-backup-storage -n openshift-adp -o yaml
@@ -358,6 +348,15 @@ aws s3 ls s3://${VELERO_BUCKET_NAME}/
358
348
[NOTE]
359
349
====
360
350
For OpenShift 4.15 and later, you can provide the role ARN directly during operator installation through the web console, which will automatically create the necessary credentials secret.
351
+
352
+
When installing through the web console with tokenized authentication support, you will see the following field:
353
+
354
+
**role ARN**
355
+
- **Field Label:** "role ARN"
356
+
- **Help Text:** "The role ARN required for the operator to access the cloud API."
357
+
- **Value to Enter:** Use the `ROLE_ARN` value from the prerequisite setup steps above (e.g., `arn:aws:iam::123456789012:role/your-cluster-openshift-oadp-aws-cloud-credentials`).
358
+
359
+
This corresponds to the IAM role created in the prerequisite steps with the format `arn:aws:iam::${AWS_ACCOUNT_ID}:role/${ROLE_NAME}`.
361
360
====
362
361
363
362
. Create the DataProtectionApplication for standard ROSA STS setup:
0 commit comments